[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20030801003053.47227.qmail@web41708.mail.yahoo.com>
From: alf1num3rik at yahoo.com (Stephen)
Subject: Re: CERT Advisory CA-2003-19 Exploitation of Vulnerabilities in Microsoft RPC Interface (fwd)
> There appears to be a separate
> denial-of-service vulnerability in
> Microsoft's RPC interface that is also
> being targeted [...]
> Exploit code for this vulnerability has been
> publicly released
they are talking about this f**** exploit or another
???
http://www.k-otik.com/exploits/07.21.MS03-026.c.php
does the MS03-026 patch correct this shit ?
Regards. Stephen
--- Muhammad Faisal Rauf Danka <mfrd@...itudex.com>
wrote:
>
>
> Regards
> --------
> Muhammad Faisal Rauf Danka
> Date: Thu, 31 Jul 2003 16:59:41 -0400
> From: CERT Advisory <cert-advisory@...t.org>
> To: cert-advisory@...t.org
> Subject: CERT Advisory CA-2003-19 Exploitation of
> Vulnerabilities in Microsoft RPC Interface
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> CERT Advisory CA-2003-19 Exploitation of
> Vulnerabilities in Microsoft RPC
> Interface
>
> Original issue date: July 31, 2003
> Last revised: -
> Source: CERT/CC
>
>
> Appendix B. References
>
> * CERT/CC Vulnerability Note VU#561284 -
> http://www.kb.cert.org/vuls/id/561284
> * CERT/CC Vulnerability Note VU#326746 -
> http://www.kb.cert.org/vuls/id/326746
> * Microsoft Security Bulletin MS03-026 -
>
>
http://microsoft.com/technet/security/bulletin/MS03-026.asp
> * Microsoft Knowledge Base
> article 823980 -
> http://support.microsoft.com?kbid=823980
>
>
______________________________________________________________________
>
> Authors: Chad Dougherty and Kevin Houle
>
>
______________________________________________________________________
>
>
=== message truncated ===
__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com
Powered by blists - more mailing lists